Cyber II | AAA & Authentication Intro by Mr. B

Cyber II | AAA & Authentication Intro by Mr. B

12th Grade

25 Qs

quiz-placeholder

Similar activities

Latihan US

Latihan US

1st Grade - University

20 Qs

Understanding Security Concepts Quiz

Understanding Security Concepts Quiz

12th Grade

20 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Managing User Security 3.1

Managing User Security 3.1

9th - 12th Grade

25 Qs

security best practices

security best practices

10th Grade - University

20 Qs

L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

Post Tes Autentikasi

Post Tes Autentikasi

12th Grade

20 Qs

Proxy Quiz

Proxy Quiz

11th - 12th Grade

20 Qs

Cyber II | AAA & Authentication Intro by Mr. B

Cyber II | AAA & Authentication Intro by Mr. B

Assessment

Quiz

Computers

12th Grade

Medium

S4, S1

Standards-aligned

Created by

Cyber Professor - Mr. B

Used 6+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

What is the main means by which anti-virus software identifies infected files?

defintions

signatures

heuristic behavior

the infected files are in purple

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Usually the the first method of multifactor authentication is a strong password. Choose a common second method for authenication. (Choose the two best methods)

A Retna Scan

A thumb or finger print

a punch card

a school id card

3.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Media Image

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts.

Which of the following models could this office be using? (Select two.)

Standalone

Client-server

Azure AD

Active Directory

Workgroup

Tags

S4

4.

FILL IN THE BLANK QUESTION

2 mins • 3 pts

True or False: As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.

5.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

An attack with the intention to make the target system unavailable to legitimate users is called what type of attack?

Denial of Service

Ransomware

Spyware

Botnet

6.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company.

Which command can you use to disable this account?

usermod -d joer

usermod -u joer

usermod -L joer

usermod -l joer

7.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

What authentication standard is used by active-duty US military personnel?

CAC

PIV

COTP

SIM

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?